diff options
author | ng0 <ng0@infotropique.org> | 2017-10-28 18:15:24 +0000 |
---|---|---|
committer | ng0 <ng0@infotropique.org> | 2017-10-28 18:15:24 +0000 |
commit | db1c7a0dd711d032bf874f6f6bf13e80aa2a07d1 (patch) | |
tree | 4c4f9aa2f8fde71d61f61c7b3a4745182cd4cacc /doc | |
parent | 6e91a3e11b01a9ab551915d50736d45bf2b54f8c (diff) | |
download | gnunet-db1c7a0dd711d032bf874f6f6bf13e80aa2a07d1.tar.gz gnunet-db1c7a0dd711d032bf874f6f6bf13e80aa2a07d1.zip |
+
Diffstat (limited to 'doc')
-rw-r--r-- | doc/documentation/README.txt | 8 | ||||
-rw-r--r-- | doc/documentation/chapters/philosophy.texi | 29 |
2 files changed, 28 insertions, 9 deletions
diff --git a/doc/documentation/README.txt b/doc/documentation/README.txt index 28223f009..c5915d6a4 100644 --- a/doc/documentation/README.txt +++ b/doc/documentation/README.txt | |||
@@ -13,6 +13,14 @@ To be moved to an appropriate section of "how to write documentation" or | |||
13 | 3. Do not use tab characters (see chapter 2.1 texinfo manual) | 13 | 3. Do not use tab characters (see chapter 2.1 texinfo manual) |
14 | 14 | ||
15 | 4. Use neutral language and third person perspective in the text | 15 | 4. Use neutral language and third person perspective in the text |
16 | |||
17 | 5. Use 2 spaces between sentences, so instead of: | ||
18 | |||
19 | We do this and the other thing. This is done by foo. | ||
20 | |||
21 | Write: | ||
22 | |||
23 | We do this and the other thing. This is done by foo. | ||
16 | * What's left to do | 24 | * What's left to do |
17 | 25 | ||
18 | - Which Texlive modules are needed? Decrease the size. | 26 | - Which Texlive modules are needed? Decrease the size. |
diff --git a/doc/documentation/chapters/philosophy.texi b/doc/documentation/chapters/philosophy.texi index 01d13254a..0f948fcab 100644 --- a/doc/documentation/chapters/philosophy.texi +++ b/doc/documentation/chapters/philosophy.texi | |||
@@ -181,8 +181,12 @@ and each of these can have a different addresses. | |||
181 | Binding messages expire after at most a week (the timeout can be | 181 | Binding messages expire after at most a week (the timeout can be |
182 | shorter if the user configures the node appropriately). | 182 | shorter if the user configures the node appropriately). |
183 | This expiration ensures that the network will eventually get rid of | 183 | This expiration ensures that the network will eventually get rid of |
184 | outdated advertisements.@footnote{More details can be found in | 184 | outdated advertisements. |
185 | @uref{https://gnunet.org/transports, A Transport Layer Abstraction for Peer-to-Peer Networks}} | 185 | @footnote{Ronaldo A. Ferreira, Christian Grothoff, and Paul Ruth. |
186 | A Transport Layer Abstraction for Peer-to-Peer Networks | ||
187 | Proceedings of the 3rd International Symposium on Cluster Computing | ||
188 | and the Grid (GRID 2003), 2003. | ||
189 | (@uref{https://gnunet.org/git/bibliography.git/plain/docs/transport.pdf, pdf})} | ||
186 | 190 | ||
187 | @cindex Accounting to Encourage Resource Sharing | 191 | @cindex Accounting to Encourage Resource Sharing |
188 | @node Accounting to Encourage Resource Sharing | 192 | @node Accounting to Encourage Resource Sharing |
@@ -249,15 +253,18 @@ Providing anonymity for users is the central goal for the anonymous | |||
249 | file-sharing application. Many other design decisions follow in the | 253 | file-sharing application. Many other design decisions follow in the |
250 | footsteps of this requirement. | 254 | footsteps of this requirement. |
251 | Anonymity is never absolute. While there are various | 255 | Anonymity is never absolute. While there are various |
252 | @uref{https://gnunet.org/anonymity_metric, scientific metrics} that can | 256 | scientific metrics@footnote{Claudia Dı́az, Stefaan Seys, Joris Claessens, |
253 | help quantify the level of anonymity that a given mechanism provides, | 257 | and Bart Preneel. Towards measuring anonymity. |
254 | there is no such thing as complete anonymity. | 258 | 2002. |
259 | (@uref{https://gnunet.org/git/bibliography.git/plain/docs/article-89.pdf, pdf})} | ||
260 | that can help quantify the level of anonymity that a given mechanism | ||
261 | provides, there is no such thing as complete anonymity. | ||
255 | GNUnet's file-sharing implementation allows users to select for each | 262 | GNUnet's file-sharing implementation allows users to select for each |
256 | operation (publish, search, download) the desired level of anonymity. | 263 | operation (publish, search, download) the desired level of anonymity. |
257 | The metric used is the amount of cover traffic available to hide the | 264 | The metric used is the amount of cover traffic available to hide the |
258 | request. | 265 | request. |
259 | While this metric is not as good as, for example, the theoretical metric | 266 | While this metric is not as good as, for example, the theoretical metric |
260 | given in @uref{https://gnunet.org/anonymity_metric, scientific metrics}, | 267 | given in scientific metrics@footnote{likewise}, |
261 | it is probably the best metric available to a peer with a purely local | 268 | it is probably the best metric available to a peer with a purely local |
262 | view of the world that does not rely on unreliable external information. | 269 | view of the world that does not rely on unreliable external information. |
263 | The default anonymity level is 1, which uses anonymous routing but | 270 | The default anonymity level is 1, which uses anonymous routing but |
@@ -331,8 +338,12 @@ encryption as the link-encryption between the nodes. GNUnet has | |||
331 | encryption on the network layer (link encryption, confidentiality, | 338 | encryption on the network layer (link encryption, confidentiality, |
332 | authentication) and again on the application layer (provided | 339 | authentication) and again on the application layer (provided |
333 | by @command{gnunet-publish}, @command{gnunet-download}, | 340 | by @command{gnunet-publish}, @command{gnunet-download}, |
334 | @command{gnunet-search} and @command{gnunet-gtk}).@footnote{More details | 341 | @command{gnunet-search} and @command{gnunet-gtk}). |
335 | can be found @uref{https://gnunet.org/encoding, here}} | 342 | @footnote{Christian Grothoff, Krista Grothoff, Tzvetan Horozov, |
343 | and Jussi T. Lindgren. | ||
344 | An Encoding for Censorship-Resistant Sharing. | ||
345 | 2009. | ||
346 | (@uref{https://gnunet.org/git/bibliography.git/plain/docs/ecrs.pdf, pdf})} | ||
336 | 347 | ||
337 | @cindex Peer Identities | 348 | @cindex Peer Identities |
338 | @node Peer Identities | 349 | @node Peer Identities |
@@ -380,7 +391,7 @@ public key first. | |||
380 | @subsection Egos | 391 | @subsection Egos |
381 | 392 | ||
382 | Egos are your "identities" in GNUnet. Any user can assume multiple | 393 | Egos are your "identities" in GNUnet. Any user can assume multiple |
383 | identities, for example to separate teir activities online. Egos can | 394 | identities, for example to separate their activities online. Egos can |
384 | correspond to pseudonyms or real-world identities. Technically, an | 395 | correspond to pseudonyms or real-world identities. Technically, an |
385 | ego is first of all a public-private key pair. | 396 | ego is first of all a public-private key pair. |
386 | 397 | ||